Microsoft has created a very robust and expandable environment with Exchange 2010. You can add redundancy in a modular fashion. Data Availability Groups (DAG) allow more than one Exchange Mailbox server role to exist with the same data. You can also have more than one of the other roles of Exchange for added redundancy.
Exchange Server 2010 High Availability and Transaction Logs Explained
A Word About Adobe PDF Document Security and Two Simple Steps You Can Take To Protect Yourself
Malicious PDF Documents can be a threat to your business I can’t tell you how many people tell me that they never worry about clicking on Adobe PDF file documents because “they are safe”. They are shocked when I tell them that infected PDF files is one of the major ways viruses and trojans are brought […]
Cybercommand chief opposes U.N. net control
The commander of the U.S. Cyber Command said Thursday that he does not favor giving the United Nations the power to regulate the Internet. You can read about it here.
Adobe Reader 8.x End of Life 11/3/11
Here is Adobe’s official life cycle page listing what their support commitment is to their various products. Notice that Adobe 8 Reader went end of core support on 11/3/2011. Adobe Reader 9 is the oldest fully supported Adobe Reader product. If you are on anything older than Adobe Reader 9, you should upgrade to Adobe’s […]
Fixing a corrupt Recycle Bin
If you have a corrupt recycle bin on your Windows 7 desktop, here is how you can fix it: Click on the Start button In the search box type: CMD.EXE Do not click on CMD but rather highlight it and right click on it.
Adobe to fix Flash flaw that allows webcam spying
A flaw was found in Adobe Flash that can allow a “clickjacking” exploit to turn on your webcam and microphone. Adobe is working on a fix. Networkworld has an article talking about this issue: https://tinyurl.com/bwt7h7p
Why Can’t I Access My Files and Why Is My New Computer and New Server Slower Than My Old One?
Anti-virus We operate under a very simple “best practice” premise for anti-virus. Workstations should have anti-virus that scans only the workstation and related memory sticks, etc. Servers should have anti-virus that scans only the server itself.
The National Security Agency suggests security should be designed assuming there will be breaches
The National Security Agency (NSA) has suggested that security systems must be built with the assumption that there will be breaches. No matter how good a firewall that is purchased, or whether you have “the best” anti-virus, there is some way around each level of security.
Windows 7 Location Based Printing – A Mobile Worker’s Dream Come True
Printing for wireless users is often confusing I have a laptop. I bring the laptop to work. It sits on our wireless network. My default printer is a nice shiny new Canon multifunction printer/copier/scanner/fax printer. I go home. The printer I use is an HP LaserJet 4000. I routinely go to other locations which have […]
Office 2010 Customize Setup
Microsoft TechNet discusses how to customize Office 2010 setup : https://tiny.cc/lks5i